Back to Email phishing

Email phishing

Police and fire department employees’ data affected in a phishing attack.

On December 13, 2019, a benefits administration company, Vimly Benefit Solutions, notified its customers that some of their information may have been compromised by an email phishing attack. This included data such as names, dates of birth, addresses, Social Security numbers, and benefits enrollment information. 

The incident.

The company discovered on August 19 that unauthorized attempts were made to access employees’ email accounts. As soon as the attack was detected, it took steps to secure the accounts and launch an investigation with the help of a cybersecurity firm. However, the firm was unable to understand the full extent of the attack and determine what customer information was exposed in the breach. With the investigations still underway, the company confirmed that it would inform potentially affected customers about the latest developments in the breach. Police and fire department employees, along with their dependents, are on the list of potentially impacted customers. 

Attackers usually resort to familiar, effective techniques, like phishing scams, to gain access to email accounts. A smart tool like Exchange Reporter Plus enables organizations to stay ahead of attackers by monitoring for and thwarting email-bound cybersecurity threats. Download a free, 60-day trial of Exchange Reporter Plus today.

How ManageEngine can help.

Exchange Reporter Plus provides a host of reports that can help you locate suspicious emails, both sent and received, based on keywords in their subject or body. Often times, these malicious emails appear to be valid, tricking users into opening the emails and clicking on links embedded in them, which can cause serious damage.

With Exchange Reporter Plus, you can locate emails based on:

  • Messages by subject keyword. Use reports to identify particular keywords in the email subject lines.
  • Messages by body keyword. Identify all the messages in your mailbox that have a particular keyword in the body of the email.
  • Attachment name. Get a report of all emails in your mailbox that have an attachment with a specific name. With the names of the malicious files, you can take the necessary steps to stop email-bound threats.
  • Attachment type. Based on an attachment’s file extension, you can spot malicious software.
  • The number of emails received from a specific domain, sender, department, or external email address. Get reports on all incoming emails from an external email address, a blacklisted sender or domain, or a specific department.

In addition, ManageEngine O365 Manager Plus provides an advanced Office 365 mailbox content search capability that identifies phishing emails by analyzing internet message headers, subjects, attachments, and bodies of emails. With this feature, you can identify senders' email addresses, the platform used by the attackers, and the servers the emails passed through.

Start your free, 30-day trial of O365 Manager Plus today to try out all these features.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.